Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 13:33
Behavioral task
behavioral1
Sample
ad8ce0d86024e90433bd74573149fcabdf78f4e8c5e9e728ada608d99c4532d7.dll
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
ad8ce0d86024e90433bd74573149fcabdf78f4e8c5e9e728ada608d99c4532d7.dll
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
ad8ce0d86024e90433bd74573149fcabdf78f4e8c5e9e728ada608d99c4532d7.dll
-
Size
52KB
-
MD5
0dbb438e4c16a480ac09c56716ccea6d
-
SHA1
8d1466f0b61133bdbd1a2174369facbc9aa9aa61
-
SHA256
ad8ce0d86024e90433bd74573149fcabdf78f4e8c5e9e728ada608d99c4532d7
-
SHA512
c3254b761773860593f3fe75c0973fe37ceb9830bd6df8c9fdb3704c010381755ffc403d013642db3d230c0107a640d53a6d264f8204c32016eb5e9256c837ee
-
SSDEEP
1536:DVV1HT7BKhwWkvoeP7VCq7TzwK9aexU9RW2rRN:DVrv41kvBPsq7Tz5vYRWWN
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27 PID 1844 wrote to memory of 1940 1844 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad8ce0d86024e90433bd74573149fcabdf78f4e8c5e9e728ada608d99c4532d7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad8ce0d86024e90433bd74573149fcabdf78f4e8c5e9e728ada608d99c4532d7.dll,#12⤵PID:1940
-